📄 deb_531_1.nasl
字号:
# OpenVAS Vulnerability Test# $Id$# Description: Auto-generated from advisory DSA 531-1## Authors:# Thomas Reinke <reinke@securityspace.com>## Copyright:# Copyright (c) 2007 E-Soft Inc. http://www.securityspace.com# Text descriptions are largerly excerpted from the referenced# advisory, and are Copyright (c) the respective author(s)## This program is free software; you can redistribute it and/or modify# it under the terms of the GNU General Public License version 2,# as published by the Free Software Foundation## This program is distributed in the hope that it will be useful,# but WITHOUT ANY WARRANTY; without even the implied warranty of# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the# GNU General Public License for more details.## You should have received a copy of the GNU General Public License# along with this program; if not, write to the Free Software# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.#if(description){ script_id(53221); script_cve_id("CVE-2004-0594", "CVE-2004-0595"); script_version ("$"); name["english"] = "Debian Security Advisory DSA 531-1 (php4)"; script_name(english:name["english"]); desc["english"] = "The remote host is missing an update to php4announced via advisory DSA 531-1.Two vulnerabilities were discovered in php4:- CVE-2004-0594 - The memory_limit functionality in PHP 4.x up to4.3.7, and 5.x up to 5.0.0RC3, under certain conditions such aswhen register_globals is enabled, allows remote attackers toexecute arbitrary code by triggering a memory_limit abort duringexecution of the zend_hash_init function and overwriting aHashTable destructor pointer before the initialization of key datastructures is complete.- CVE-2004-0595 - The strip_tags function in PHP 4.x up to 4.3.7, and5.x up to 5.0.0RC3, does not filter null (\0) characters within tagnames when restricting input to allowed tags, which allowsdangerous tags to be processed by web browsers such as InternetExplorer and Safari, which ignore null characters and facilitatethe exploitation of cross-site scripting (XSS) vulnerabilities.For the current stable distribution (woody), these problems have beenfixed in version 4.1.2-7.For the unstable distribution (sid), these problems have been fixed inversion 4:4.3.8-1.We recommend that you update your php4 package.Solution:https://secure1.securityspace.com/smysecure/catid.html?in=DSA%20531-1Risk factor : High"; script_description(english:desc["english"]); summary["english"] = "Debian Security Advisory DSA 531-1 (php4)"; script_summary(english:summary["english"]); script_category(ACT_GATHER_INFO); script_copyright(english:"Copyright (c) 2005 E-Soft Inc. http://www.securityspace.com"); family["english"] = "Debian Local Security Checks"; script_family(english:family["english"]); script_dependencies("gather-package-list.nasl"); script_require_keys("ssh/login/packages"); exit(0);}## The script code starts here#include("revisions-lib.inc");include("pkg-lib-deb.inc");vuln = 0;if(isdpkgvuln(pkg:"php4-dev", ver:"4.1.2-7", rls:"DEB3.0")) { vuln = 1;}if(isdpkgvuln(pkg:"php4-pear", ver:"4.1.2-7", rls:"DEB3.0")) { vuln = 1;}if(isdpkgvuln(pkg:"caudium-php4", ver:"4.1.2-7", rls:"DEB3.0")) { vuln = 1;}if(isdpkgvuln(pkg:"php4", ver:"4.1.2-7", rls:"DEB3.0")) { vuln = 1;}if(isdpkgvuln(pkg:"php4-cgi", ver:"4.1.2-7", rls:"DEB3.0")) { vuln = 1;}if(isdpkgvuln(pkg:"php4-curl", ver:"4.1.2-7", rls:"DEB3.0")) { vuln = 1;}if(isdpkgvuln(pkg:"php4-domxml", ver:"4.1.2-7", rls:"DEB3.0")) { vuln = 1;}if(isdpkgvuln(pkg:"php4-gd", ver:"4.1.2-7", rls:"DEB3.0")) { vuln = 1;}if(isdpkgvuln(pkg:"php4-imap", ver:"4.1.2-7", rls:"DEB3.0")) { vuln = 1;}if(isdpkgvuln(pkg:"php4-ldap", ver:"4.1.2-7", rls:"DEB3.0")) { vuln = 1;}if(isdpkgvuln(pkg:"php4-mcal", ver:"4.1.2-7", rls:"DEB3.0")) { vuln = 1;}if(isdpkgvuln(pkg:"php4-mhash", ver:"4.1.2-7", rls:"DEB3.0")) { vuln = 1;}if(isdpkgvuln(pkg:"php4-mysql", ver:"4.1.2-7", rls:"DEB3.0")) { vuln = 1;}if(isdpkgvuln(pkg:"php4-odbc", ver:"4.1.2-7", rls:"DEB3.0")) { vuln = 1;}if(isdpkgvuln(pkg:"php4-recode", ver:"4.1.2-7", rls:"DEB3.0")) { vuln = 1;}if(isdpkgvuln(pkg:"php4-snmp", ver:"4.1.2-7", rls:"DEB3.0")) { vuln = 1;}if(isdpkgvuln(pkg:"php4-sybase", ver:"4.1.2-7", rls:"DEB3.0")) { vuln = 1;}if(isdpkgvuln(pkg:"php4-xslt", ver:"4.1.2-7", rls:"DEB3.0")) { vuln = 1;}if(vuln) { security_hole(0);}
⌨️ 快捷键说明
复制代码
Ctrl + C
搜索代码
Ctrl + F
全屏模式
F11
切换主题
Ctrl + Shift + D
显示快捷键
?
增大字号
Ctrl + =
减小字号
Ctrl + -